
North Korean IT workers have been embedding themselves in crypto companies and decentralized finance projects for at least seven years, according to a cybersecurity analyst.
âLots of DPRK IT workers built the protocols you know and love, all the way back to DeFi summer,â said MetaMask developer and security researcher Taylor Monahan on Sunday.
Monahan claimed that over 40 DeFi platforms, some being well-known names, have had North Korean IT workers working on their protocols.
The âseven years of blockchain dev experienceâ on their resume is ânot a lie,â she added.
The Lazarus Group is a North Korean-affiliated hacking collective that has stolen an estimated $7 billion in crypto since 2017, according to analysts at creator network R3ACH.
It has been linked to the industryâs highest-profile hacks, including the $625 million Ronin Bridge exploit in 2022, the $235 million WazirX hack in 2024 and the $1.4 billion Bybit heist in 2025.
Monahanâs comments came just hours after the Drift Protocol said it had âmedium-high confidenceâ that the recent $280 million exploit against it was carried out by a North Korean state-affiliated group.
Tim Ahhl, founder of the Titan Exchange, a Solana-based DEX aggregator, said that in a previous job, âwe interviewed someone who turned out to be a Lazarus operative.â
Ahhl said the candidate âdid video calls and was extremely qualified.â He declined an in-person interview and they later discovered his name in a Lazarus âinfo dump.â
The US Office of Foreign Assets Control has a website where crypto businesses can screen counterparties against updated OFAC sanctions lists and be alert to patterns consistent with IT worker fraud.Â

Lazarus Group attack timeline. Source: R3ACH Network
Related: Drift Protocol says $280M exploit took 'months of deliberate preparation'
Drift Protocolâs postmortem on last weekâs $280 million exploit also pointed to North Korean-affiliated hackers for the attack.
However, it said the face-to-face meetings that eventually led to the exploit were not with North Korean nationals, but rather âthird-party intermediariesâ with âfully constructed identities including employment histories, public-facing credentials, and professional networks.â
âYears later, and it seems Lazarus now has non-NKs [North Koreans] working for them to con people in person,â said Ahhl.
Lazarus Group is the collective name for âall DPRK state-sponsored cyber actors,â explained blockchain sleuth ZachXBT on Sunday.
âThe main issue is that everyone groups them all together when the complexity of threats is different,â he added.
ZachXBT said that threats via job postings, LinkedIn, email, Zoom, or interviews are âbasic and in no way sophisticated ⊠the only thing about it is theyâre relentless.â
âIf you or your team still falls for them in 2026, youâre very likely negligent,â he said.

There are two types of attack vectors, one more sophisticated than the other. Source: ZachXBT
Magazine: No more 85% Bitcoin collapses, Taiwan needs BTC war reserve: Hodlerâs Digest
Share this article





See every story in Crypto â including breaking news and analysis.